-
Notifications
You must be signed in to change notification settings - Fork 2
/
main.bib
355 lines (325 loc) · 10.8 KB
/
main.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
@article{ringct,
title={Ring confidential transactions},
author={Noether, Shen and Mackenzie, Adam and others},
journal={Ledger},
volume={1},
pages={1--18},
year={2016}
}
@inproceedings{zcash_sprout,
author = {Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars},
title = {Succinct Non-Interactive Zero Knowledge for a von {N}eumann Architecture},
year = {2014},
isbn = {9781931971157},
publisher = {USENIX Association},
address = {USA},
booktitle = {Proceedings of the 23rd USENIX Conference on Security Symposium},
pages = {781–796},
numpages = {16},
location = {San Diego, CA},
series = {SEC'14}
}
@misc{zcash_sapling,
author = {Sean Bowe and
Ariel Gabizon and
Ian Miers},
title = {Scalable Multi-party Computation for zk-{SNARK} Parameters in the Random Beacon Model},
howpublished = {Cryptology ePrint Archive, Report 2017/1050},
year = {2017},
url = {https://ia.cr/2017/1050},
}
@InProceedings{mw,
author="Fuchsbauer, Georg
and Orr{\`u}, Michele
and Seurin, Yannick",
editor="Ishai, Yuval
and Rijmen, Vincent",
title="Aggregate Cash Systems: A Cryptographic Investigation of {M}imblewimble",
booktitle="Advances in Cryptology -- EUROCRYPT 2019",
year="2019",
publisher="Springer International Publishing",
address="Cham",
pages="657--689",
isbn="978-3-030-17653-2"
}
@misc{lelantus,
author = {Aram Jivanyan},
title = {Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies},
howpublished = {Cryptology ePrint Archive, Report 2019/373},
year = {2019},
url = {https://ia.cr/2019/373},
}
@misc{lmw,
author = {Pyrros Chaidos, Vladislav Gelfer },
title = {Lelantus-{CLA}},
howpublished = {Cryptology ePrint Archive, Report 2021/1036},
year = {2021},
url = {https://ia.cr/2021/1036},
}
@misc{zcash,
author = {Daira Hopwood and Sean Bowe and Taylor Hornby and Nathan Wilcox},
title = {Zcash Protocol Specification},
year = {2021},
url = {https://github.com/zcash/zips/blob/master/protocol/protocol.pdf},
}
@InProceedings{groth,
author="Groth, Jens
and Kohlweiss, Markulf",
editor="Oswald, Elisabeth
and Fischlin, Marc",
title="One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin",
booktitle="Advances in Cryptology - EUROCRYPT 2015",
year="2015",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="253--280",
isbn="978-3-662-46803-6"
}
@article{musig,
title={Simple {S}chnorr multi-signatures with applications to {B}itcoin},
author={Maxwell, Gregory and Poelstra, Andrew and Seurin, Yannick and Wuille, Pieter},
journal={Designs, Codes and Cryptography},
volume={87},
number={9},
pages={2139--2164},
year={2019},
publisher={Springer}
}
@InProceedings{bootle,
author="Bootle, Jonathan
and Cerulli, Andrea
and Chaidos, Pyrros
and Ghadafi, Essam
and Groth, Jens
and Petit, Christophe",
editor="Pernul, G{\"u}nther
and Y A Ryan, Peter
and Weippl, Edgar",
title="Short Accountable Ring Signatures Based on {DDH}",
booktitle="Computer Security -- ESORICS 2015",
year="2015",
publisher="Springer International Publishing",
address="Cham",
pages="243--265",
isbn="978-3-319-24174-6"
}
@InProceedings{triptych,
author="Noether, Sarang
and Goodell, Brandon",
editor="Garcia-Alfaro, Joaquin
and Navarro-Arribas, Guillermo
and Herrera-Joancomarti, Jordi",
title="Triptych: Logarithmic-Sized Linkable Ring Signatures with Applications",
booktitle="Data Privacy Management, Cryptocurrencies and Blockchain Technology",
year="2020",
publisher="Springer International Publishing",
address="Cham",
pages="337--354",
isbn="978-3-030-66172-4"
}
@InProceedings{dodis,
author="Dodis, Yevgeniy
and Yampolskiy, Aleksandr",
editor="Vaudenay, Serge",
title="A Verifiable Random Function with Short Proofs and Keys",
booktitle="Public Key Cryptography - PKC 2005",
year="2005",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="416--431",
isbn="978-3-540-30580-4"
}
@inproceedings{omniring,
author = {Lai, Russell W. F. and Ronge, Viktoria and Ruffing, Tim and Schr\"{o}der, Dominique and Thyagarajan, Sri Aravinda Krishnan and Wang, Jiafan},
title = {Omniring: Scaling Private Payments Without Trusted Setup},
year = {2019},
isbn = {9781450367479},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3319535.3345655},
booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages = {31–48},
numpages = {18},
keywords = {privacy, Monero, anonymity, cryptocurrency},
location = {London, United Kingdom},
series = {CCS '19}
}
@INPROCEEDINGS{bp,
author={Bünz, Benedikt and Bootle, Jonathan and Boneh, Dan and Poelstra, Andrew and Wuille, Pieter and Maxwell, Greg},
booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
title={Bulletproofs: Short Proofs for Confidential Transactions and More},
year={2018},
volume={},
number={},
pages={315-334},
doi={10.1109/SP.2018.00020}}
@misc{bp_plus,
author = {Heewon Chung and
Kyoohyung Han and
Chanyang Ju and
Myungsun Kim and
Jae Hong Seo},
title = {Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger},
howpublished = {Cryptology ePrint Archive, Report 2020/735},
year = {2020},
url = {https://ia.cr/2020/735},
}
@INPROCEEDINGS{zerocash,
author={Ben Sasson, Eli and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars},
booktitle={2014 IEEE Symposium on Security and Privacy},
title={Zerocash: Decentralized Anonymous Payments from {B}itcoin},
year={2014},
volume={},
number={},
pages={459-474},
doi={10.1109/SP.2014.36}}
@misc{clsag,
author = {Brandon Goodell and
Sarang Noether and
\texttt{RandomRun}},
title = {Concise Linkable Ring Signatures and Forgery Against Adversarial Keys},
howpublished = {Cryptology ePrint Archive, Report 2019/654},
year = {2019},
url = {https://ia.cr/2019/654},
}
@techreport{chachapoly,
author = {Y. Nir and A. Langley},
title = {Cha{C}ha20 and {P}oly1305 for {IETF} Protocols},
howpublished = {Internet Requests for Comments},
type = {RFC},
number = {7539},
year = {2015},
month = {May},
issn = {2070-1721},
publisher = {RFC Editor},
institution = {RFC Editor},
url = {http://www.rfc-editor.org/rfc/rfc7539.txt},
}
@article{pippenger,
title={On the evaluation of powers and monomials},
author={Pippenger, Nicholas},
journal={SIAM Journal on Computing},
volume={9},
number={2},
pages={230--250},
year={1980},
publisher={SIAM}
}
@misc{seraphis,
author = {\texttt{koe}},
title = {Seraphis: A Privacy-Preserving Transaction Protocol Abstraction},
howpublished = {GitHub repository release \texttt{DRAFT-v0.0.11}},
year = {2021},
url = {https://github.com/UkoeHB/Seraphis/releases/tag/DRAFT-v0.0.11}
}
@article{schnorr,
author = {Gregory Neven and Nigel P. Smart and Bogdan Warinschi},
doi = {10.1515/JMC.2009.004},
title = {Hash function requirements for {S}chnorr signatures},
journal = {Journal of Mathematical Cryptology},
number = {1},
volume = {3},
year = {2009},
pages = {69--87}
}
@misc{frost,
author = {Chelsea Komlo and Ian Goldberg},
title = {{FROST}: Flexible Round-Optimized {S}chnorr Threshold Signatures},
howpublished = {Cryptology ePrint Archive, Report 2020/852},
year = {2020},
url = {https://ia.cr/2020/852},
}
@misc{schnorrwithschnorr,
author = {Elizabeth Crites and
Chelsea Komlo and
Mary Maller},
title = {How to Prove {S}chnorr Assuming {S}chnorr: Security of Multi- and Threshold Signatures},
howpublished = {Cryptology ePrint Archive, Report 2021/1375},
year = {2021},
url = {https://ia.cr/2021/1375},
}
@InProceedings{keyprivacy,
author="Bellare, Mihir
and Boldyreva, Alexandra
and Desai, Anand
and Pointcheval, David",
editor="Boyd, Colin",
title="Key-Privacy in Public-Key Encryption",
booktitle="Advances in Cryptology --- ASIACRYPT 2001",
year="2001",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="566--582",
isbn="978-3-540-45682-7"
}
@InProceedings{batchschnorr,
author="Gennaro, R.
and Leigh, D.
and Sundaram, R.
and Yerazunis, W.",
editor="Lee, Pil Joong",
title="Batching {S}chnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices",
booktitle="Advances in Cryptology - ASIACRYPT 2004",
year="2004",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="276--292",
isbn="978-3-540-30539-2"
}
@InProceedings{kea_damgard,
author="Damg{\aa}rd, Ivan",
editor="Feigenbaum, Joan",
title="Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks",
booktitle="Advances in Cryptology --- CRYPTO '91",
year="1992",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="445--456",
isbn="978-3-540-46766-3"
}
@InProceedings{kea_bellare,
author="Bellare, Mihir
and Palacio, Adriana",
editor="Franklin, Matt",
title="The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols",
booktitle="Advances in Cryptology -- CRYPTO 2004",
year="2004",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="273--289",
isbn="978-3-540-28628-8"
}
@inproceedings{matrict,
author = {Esgin, Muhammed F. and Zhao, Raymond K. and Steinfeld, Ron and Liu, Joseph K. and Liu, Dongxi},
title = {Mat{R}i{CT}: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol},
year = {2019},
isbn = {9781450367479},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3319535.3354200},
booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages = {567–584},
numpages = {18},
keywords = {ring signature, zero-knowledge, RingCT, lattice, post-quantum, group signature},
location = {London, United Kingdom},
series = {CCS '19}
}
@misc{bellare_frost,
author = {Mihir Bellare and Stefano Tessaro and Chenzhi Zhu},
title = {Stronger Security for Non-Interactive Threshold Signatures: {BLS} and {FROST}},
howpublished = {Cryptology ePrint Archive, Paper 2022/833},
year = {2022},
url = {https://eprint.iacr.org/2022/833}
}
@inproceedings{key_commitment,
title = {How to Abuse and Fix Authenticated Encryption Without Key Commitment},
author={Albertini, Ange and Duong, Thai and Gueron, Shay and K{\"o}lbl, Stefan and Luykx, Atul and Schmieg, Sophie},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
year = {2022},
isbn = {978-1-939133-31-1},
address = {Boston, MA},
pages = {3291--3308},
url = {https://www.usenix.org/conference/usenixsecurity22/presentation/albertini},
publisher = {USENIX Association},
month = aug,
}